@@ -8546,29 +8546,32 @@ This indicates a bug inside LDK. Please report this error at https://github.com/
8546
8546
}
8547
8547
}
8548
8548
8549
- #[rustfmt::skip]
8550
- fn internal_peer_storage_retrieval(&self, peer_node_id: PublicKey, msg: msgs::PeerStorageRetrieval) -> Result<(), MsgHandleErrInternal> {
8549
+ fn internal_peer_storage_retrieval(
8550
+ &self, peer_node_id: PublicKey, msg: msgs::PeerStorageRetrieval,
8551
+ ) -> Result<(), MsgHandleErrInternal> {
8551
8552
// TODO: Check if have any stale or missing ChannelMonitor.
8552
8553
let logger = WithContext::from(&self.logger, Some(peer_node_id), None, None);
8553
- let err = || MsgHandleErrInternal::from_chan_no_close(
8554
- ChannelError::Ignore("Invalid PeerStorageRetrieval message received.".into()),
8555
- ChannelId([0; 32]),
8556
- );
8554
+ let err = || {
8555
+ MsgHandleErrInternal::from_chan_no_close(
8556
+ ChannelError::Ignore("Invalid PeerStorageRetrieval message received.".into()),
8557
+ ChannelId([0; 32]),
8558
+ )
8559
+ };
8557
8560
8558
8561
let encrypted_ops = match EncryptedOurPeerStorage::new(msg.data) {
8559
8562
Ok(encrypted_ops) => encrypted_ops,
8560
8563
Err(()) => {
8561
8564
log_debug!(logger, "Received a peer backup which wasn't long enough to be valid");
8562
8565
return Err(err());
8563
- }
8566
+ },
8564
8567
};
8565
8568
8566
8569
let decrypted = match encrypted_ops.decrypt(&self.node_signer.get_peer_storage_key()) {
8567
8570
Ok(decrypted_ops) => decrypted_ops.into_vec(),
8568
8571
Err(()) => {
8569
8572
log_debug!(logger, "Received a peer backup which was corrupted");
8570
8573
return Err(err());
8571
- }
8574
+ },
8572
8575
};
8573
8576
8574
8577
log_trace!(logger, "Got valid {}-byte peer backup from {}", decrypted.len(), peer_node_id);
0 commit comments